Skip to main content

About your Search

20120925
20121003
SHOW
STATION
SFGTV2 4
CSPAN2 1
LANGUAGE
Search Results 0 to 4 of about 5 (some duplicates have been removed)
SFGTV2
Sep 25, 2012 1:00am PDT
is that there is not an answer. you have brought about by bringing this conversation forum. it is not just law enforcement perspective, it is not just the community-based perspective, it is not just the research perspective, it is a multi- layered approach. first and foremost, we do have to consider meeting youth where they are act. we are talking about perpetrators of violence or what not or system involved or involved in gangs, we have to meet them where they are at. pain and hurt produces more hurt, right? what is fundamental it is addressing back pain -- addressing that pain. not looking at folks in a punitive way and saying, this guy is notorious, we have to lock him up. that person is hurting. he might have been abused, you know. first and foremost, we need to meet that individual's needs. i am pursuing a master's in social work. i have that lens. we need to heal our communities and take those answers upon ourselves. everybody has already -- we sure this in perspective, but definitely, we need to create community anchored solutions. that involves a discourse with policy makers. as people of color, w
CSPAN
Oct 1, 2012 5:00pm EDT
in another country because of the environmental laws or other laws are more supportive of the needs of their businesses and deliver product to market. so with that, then we are looking at another set of tensions. we are expecting the global supply chain to be available at all times. to enable from an ict perspective our confidentiality of the businesses and then we're demanding those products maintain their integrity. it's no mistake that i'm using the confidencialty integrity and available of information assurance, that's in many ways we're talking about the three tenants of information assurance we're not worried about the integrity of the products coming in to the global supply chain that might comprise the businesses or confidentiality so software behind the actual stuff. the products are being built, delivered maintains, upgraded all around the world and they are vulnerable to opponents who wish it harm. to manipulate the product through the design through the life cycle. and adversaries that may have access to those particular networks or designed to have accessn'ting access t
Search Results 0 to 4 of about 5 (some duplicates have been removed)